bitpixie Proof of Concept - Bitlocker Decryptor
☆135Sep 21, 2025Updated 5 months ago
Alternatives and similar repositories for bitpixie
Users that are interested in bitpixie are comparing it to the libraries listed below
Sorting:
- Bitpixie exploitation PoC☆98Oct 28, 2025Updated 4 months ago
- A list of public attacks on BitLocker☆417Aug 9, 2025Updated 7 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆46Mar 7, 2026Updated last week
- Script for WhatsApp Web Client Live Forensics☆28Dec 31, 2025Updated 2 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆22Oct 3, 2019Updated 6 years ago
- SATA sniffing☆15Jul 28, 2022Updated 3 years ago
- ☆83Apr 22, 2022Updated 3 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- ☆13Aug 20, 2025Updated 7 months ago
- ☆22Oct 18, 2023Updated 2 years ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- Android Usagestats XML + Protobuf Parser☆28Oct 11, 2020Updated 5 years ago
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- Extract files from Apple devices on Windows, Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and "adv…☆440Updated this week
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆20Nov 6, 2023Updated 2 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- ☆28Dec 17, 2025Updated 3 months ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ☆18Feb 6, 2019Updated 7 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- ☆26Nov 8, 2024Updated last year
- ☆11Jul 3, 2021Updated 4 years ago
- A Simple DLL Forward for Fucking IDA 9.0, which removed ida64.dll from beta3.☆14Sep 19, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- ☆12Apr 23, 2020Updated 5 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 9 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Assorted Python☆15Sep 6, 2024Updated last year
- Java based Raritan Dominion KMV Client in a Java-free HTML5 browser window or via RDP.☆14Oct 25, 2022Updated 3 years ago